Judee K. Burgoon

Affiliations:
  • University of Arizona, Center for the Management of Information, Tucson, AZ, USA


According to our database1, Judee K. Burgoon authored at least 94 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Non-Invasive Measurement of Trust in Group Interactions.
IEEE Trans. Affect. Comput., 2023

The future of automated capture of social kinesic signals for psychiatric purposes.
Frontiers Comput. Sci., 2023

2021
Automated Methods to Examine Nonverbal Synchrony in Dyads.
Proceedings of the ChaLearn LAP Challenge on Understanding Social Behavior in Dyadic and Small Group Interactions, 2021

2020
Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork.
J. Manag. Inf. Syst., 2020

2019
Predicting dominance in multi-person videos.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Automatic Long-Term Deception Detection in Group Interaction Videos.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Attention-based Facial Behavior Analytics inSocial Communication.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

2017
A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features.
J. Manag. Inf. Syst., 2017

Mitigation of Cognitive Bias with a Serious Game: Two Experiments Testing Feedback Timing and Source.
Int. J. Game Based Learn., 2017

Social Signals of Deception and Dishonesty.
Proceedings of the Social Signal Processing, 2017

Interaction Coordination and Adaptation.
Proceedings of the Social Signal Processing, 2017

2016
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions.
J. Manag. Inf. Syst., 2016

Special Issue: Information Systems for Deception Detection.
J. Manag. Inf. Syst., 2016

Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task.
Int. J. Hum. Comput. Stud., 2016

Mitigating bias blind spot via a serious video game.
Comput. Hum. Behav., 2016

Exploring Failure and Engagement in a Complex Digital Training Game: A Multi-method Examination.
AIS Trans. Hum. Comput. Interact., 2016

Discussion.
Proceedings of the 17th Annual Conference of the International Speech Communication Association, 2016

The INTERSPEECH 2016 Computational Paralinguistics Challenge: A Summary of Results.
Proceedings of the 17th Annual Conference of the International Speech Communication Association, 2016

The Native Language Sub-Challenge: The Data.
Proceedings of the 17th Annual Conference of the International Speech Communication Association, 2016

The Sincerity Sub-Challenge: The Data.
Proceedings of the 17th Annual Conference of the International Speech Communication Association, 2016

The Deception Sub-Challenge: The Data.
Proceedings of the 17th Annual Conference of the International Speech Communication Association, 2016

The INTERSPEECH 2016 Computational Paralinguistics Challenge: Deception, Sincerity & Native Language.
Proceedings of the 17th Annual Conference of the International Speech Communication Association, 2016

Embodied Conversational Agent-Based Deception Detection: Concealed Information Test Using Automated Electrodermal, Vocal, and Oculmentric Measurements.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

Serious Games: An Evaluation Framework and Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Is Interactional Dissynchrony a Clue to Deception? Insights From Automated Analysis of Nonverbal Visual Cues.
IEEE Trans. Cybern., 2015

Effects of Veracity, Modality, and Sanctioning on Credibility Assessment During Mediated and Unmediated Interviews.
Commun. Res., 2015

Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Perinasal indicators of deceptive behavior.
Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, 2015

Machine learning methods for credibility assessment of interviewees based on posturographic data.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

2014
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals.
J. Manag. Inf. Syst., 2014

A Rigidity Detection System for Automated Credibility Assessment.
J. Manag. Inf. Syst., 2014

Toward an Objective Linguistic-Based Measure of Perceived Embodied Conversational Agent Power and Likeability.
Int. J. Hum. Comput. Interact., 2014

Empowered by Persuasive Deception.
Commun. Res., 2014

Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game.
Comput. Hum. Behav., 2014

Mitigating Cognitive Bias through the Use of Serious Games: Effects of Feedback.
Proceedings of the Persuasive Technology - 9th International Conference, 2014

2013
Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues.
ACM Trans. Manag. Inf. Syst., 2013

MACBETH: Development of a Training Game for the Mitigation of Cognitive Bias.
Int. J. Game Based Learn., 2013

Automated analysis of interactional synchrony using robust facial tracking and expression recognition.
Proceedings of the 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, 2013

2012
Establishing a foundation for automated human credibility screening.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Predicting Users' Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Benchmark Driven Framework for Development of Emotion Sensing Support Systems.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Predicting Veracity from Linguistic Indicators.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Embodied Conversational Agent - Based Kiosk for Automated Interviewing.
J. Manag. Inf. Syst., 2011

Identification of fraudulent financial statements using linguistic credibility analysis.
Decis. Support Syst., 2011

2010
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment.
J. Manag. Inf. Syst., 2010

Judging the Credibility of Information Gathered from Face-to-Face Interactions.
ACM J. Data Inf. Qual., 2010

Border Security Credibility Assessments via Heterogeneous Sensor Fusion.
IEEE Intell. Syst., 2010

Motion Profiles for Deception Detection Using Visual Cues.
Proceedings of the Computer Vision - ECCV 2010, 2010

2009
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept.
IEEE Trans. Intell. Transp. Syst., 2009

2008
Video-Based Deception Detection.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

The Role of E-Training in Protecting Information Assets Against Deception Attacks.
MIS Q. Executive, 2008

An empirical investigation of virtual Interaction in supporting learning.
Data Base, 2008

2007
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Computer-aided Credibility Assessment by Novice Lie-Catchers.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Interactions Between System Evaluation and Theory Testing: A Demonstration of the Power of a Multifaceted Approach to Information Systems Research.
J. Manag. Inf. Syst., 2006

Detecting Deception in Person-of-Interest Statements.
Proceedings of the Intelligence and Security Informatics, 2006

Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

An Analysis of Text-Based Deception Detection Tools.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior.
IEEE Intell. Syst., 2005

Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.
Proceedings of the Intelligence and Security Informatics, 2005

An Empirical Study on Dynamic Effects on Deception Detection.
Proceedings of the Intelligence and Security Informatics, 2005

Automatic Extraction of Deceptive Behavioral Cues from Video.
Proceedings of the Intelligence and Security Informatics, 2005

HMM-Based Deception Recognition from Visual Cues.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Virtual Interaction for Effective E-Learning.
Proceedings of the International Conference on Information Systems, 2005

StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Heuristics and Modalities in Determining Truth Versus Deception.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

An Approach for Intent Identification by Building on Deception Detection.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication.
J. Manag. Inf. Syst., 2004

Language dominance in interpersonal deception in computer-mediated communication.
Comput. Hum. Behav., 2004

Using Speech Act Profiling for Deception Detection.
Proceedings of the Intelligence and Security Informatics, 2004

Testing Various Modes of Computer-Based Training for Deception Detection.
Proceedings of the Intelligence and Security Informatics, 2004

Computer-Based Training for Deception Detection: What Users Want?
Proceedings of the Intelligence and Security Informatics, 2004

The Interaction of Research Methods for System Evaluation and Theory Testing: A New Vision of the Benefits of Multi-Methodological Information Systems Research.
Proceedings of the International Conference on Information Systems, 2004

An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Training to Detect Deception: An Experimental Investigation.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

User Experience with Agent99 Trainer: A Usability Study.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Towards A More Robust Theory and Measure of Social Presence: Review and Suggested Criteria.
Presence Teleoperators Virtual Environ., 2003

A Longitudinal Analysis of Language Behavior of Deception in E-mail.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Training Professionals to Detect Deception.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Detecting Deception through Linguistic Analysis.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Trust and Deception in Mediated Communication.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

AGENT99 Trainer: Designing a Web-Based Multimedia Training System for Deception Detection Knowledge Transfer.
Proceedings of the 9th Americas Conference on Information Systems, 2003

Can People Be Trained to Better Detect Deception? Instructor-Led vs. Web-Based Training.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2000
Testing the Interactivity Model: Communication Processes, Partner Assessments, and the Quality of Collaborative Work.
J. Manag. Inf. Syst., 2000

1999
The Impact of Anthropomorphic Interfaces on Influence, Understanding, and Credibility.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Designing Interfaces to Maximize the Quality of Collaborative Work.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

The role of expectations in human-computer interaction.
Proceedings of GROUP'99, 1999

1997
A Vision for a New Discipline.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997


  Loading...